This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
is a proactive approach to security across all layers of the digital space where every transaction is continuously verified. It uses the rule of least privilege and relies on real-time threat intelligence, detection and response.
• AI and machine learning • Attacks on supply chains and critical infrastructure • Cyber insurance • State-sponsored attacks and hacktivism • Deepfake t... more...
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... more...
Zákon, ktorým sa mení a dopĺňa zákon č. 272/2016 Z. z. o dôveryhodných službách pre elektronické transakcie na vnútornom trhu a o zmene a doplnení niektorých zákonov (zák... more...show link
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...